Editor writes on a blog article

The SoftwareONE Blog

SoftwareONE Blog

The SoftwareONE blog features content from authors across our company. Our specialists give insight into the latest technology topics, product releases or industry trends. If you want to stay up-to-date, just subscribe to the Blog's RSS feed.

Automation: Cybersecurity’s Friend and Enemy

Automation: Cybersecurity’s Friend and Enemy

Have you integrated automation into your security strategy? Keep reading as we take a closer look at the pros and cons of an automated cybersecurity defense.

Cyber Security Update May 2022
  • 23 June 2022
  • Bala Sethunathan
  • Managed Security, Cybersecurity
  • Data Security, Security, Ransomware

Cyber Security Update May 2022

Scammers are using more ruthless and sophisticated phishing techniques to acquire confidential data. Don’t let the criminals fool you.

A Holistic SAM Approach for Procurement and Sourcing

Beyond Compliance: A Holistic SAM Approach for Procurement and Sourcing A Holistic SAM Approach for Procurement and Sourcing

In order to strengthen your digital supply chain (DSC) strategy, you must evolve how you approach SAM. Learn more.

Adobe za izobraževalne ustanove - zdaj tudi v SoftwareONE

Adobe za izobraževalne ustanove - zdaj tudi v SoftwareONE

SoftwareONE, d.o.o. je pridobil Adobe Education status. Zdaj lahko Adobe programske rešitve, kot so Acrobat, Creative Cloud, Adobe Sign, ponudimo tudi izobraževalnim ustanovam.

The environmental imperative – The role of FinOps
  • 13 June 2022
  • Cloud Spend Management, FinOps
  • Cloud, Cloud Cost Optimization, Cloud Financial Management

The Environmental Imperative – The Role of FinOps

By making the most efficient use of your cloud infrastructure with the help of a robust FinOps framework, you can both control costs and improve your environmental performance.

Is MFA Enough to Protect Your Data?
  • 07 June 2022
  • Cybersecurity, Cybersecurity User Awareness, Managed Security
  • Microsoft, EDR, Conditional Access, Zero Trust

Z večfaktorsko avtentikacijo in Secure Score nad kibernetske grožnje

Imate implementirano večfaktorsko avtentikacijo (MFA) in uporabljate Microsoft Secure Score, pa je to dovolj za ubranitev pred grožnjami kibernetske varnosti?

{ "hideLoadMore": false, "wrongEntriesCount": 0 }